Configure and test network security
ASSESSMENT 2
Requirements
Using knowledge acquired from the unit, read over the following case study and answer the questions to the best of your ability. Identify the useful information and criteria that support your answers.You may assume anything that has not been mentioned as long as you clearly state it is an assumption.
All of their data will be stored on servers in an offsite server farm which will be physically guarded around the clock by a professional team of security guards. Their programming team, the people behind their application as well as making the service possible all work remotely. Their current setup makes it so that the programmers are only able to access the specific code they are needed for so it is not possible for them to steal any data which will be useful to them. They are also made to work on the company’s own platform so none of the data is stored on the endpoint devices either.
Users will access their own storage space using the company’s own application which currently uses two factor authentications.
|
---|
2.3 Once you’ve identified the various risks and vulnerabilities as well as what can be done to counter them. The next step is to implement your solution.
2.4 Suppose after discussing it with the various parties such as Jared, the systems administrator, network administrator, as well as others from the business side of things, it’s been decided that StoreIt will host its own VPN server.
Aside from this you discover that StoreIt has 3 redundant, meaning 4 total, internet connections to ensure availability as well as to improve overall speed.
2.5 After you have implemented the security measures from the previous questions, Jared asks how you plan on testing the various systems to ensure everything is working as it should.
2.6 Given the various systems that are established throughout StoreIt’s network, how will you manage to keep track of everything? How will you identify any incidents or attacks and what will you have to do in order to keep the network secure?
|
---|
Suppose that StoreIt begins its business as planned thanks to the efforts of both you and Jessica.
While looking through the latest news in network security you find that a new vulnerability has been discovered in the software that is used for multiple StoreIt servers. Similarly, you find that in order to fix this issue a new patch had been revealed and it is highly recommended that it be installed as soon as possible.
|
---|